IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 30 of 30 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2016-03-03
15:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Detection of Vulnerability Scanning Using Features of Collective Accesses Collected from Several Honeypots
Naomi Kuze, Shu Ishikura (Osaka Univ.), Takeshi Yagi, Daiki Chiba (NTT), Masayuki Murata (Osaka Univ.) ICSS2015-55
Attacks against websites are increasing rapidly with the expansion of web services. Diversifying web services make it di... [more] ICSS2015-55
pp.47-52
NS, IN
(Joint)
2016-03-04
11:00
Miyazaki Phoenix Seagaia Resort Cyber Attack Prediction using News Article Analysis
Baatarsuren Munkhdorj, Sekiya Yuji (UTokyo) IN2015-136
The common operation of current cyber defense systems is to search a signature of cyber attack by monitoring network tra... [more] IN2015-136
pp.165-170
ISEC, IT, WBS 2015-03-02
15:35
Fukuoka The University of Kitakyushu Analysis on isomorphism classes of elliptic curves subjected to GHS attack over prime degree extensions of finite fields with odd characteristic
Takayuki Hosogaya (Chuo Univ.), Tsutomu Iijima (Koden), Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.) IT2014-76 ISEC2014-89 WBS2014-68
The GHS attack is known to map the discrete logarithm problem (DLP) in the Jacobian of a curve $C_0$ defined over the $d... [more] IT2014-76 ISEC2014-89 WBS2014-68
pp.89-95
ICSS 2014-11-28
10:20
Miyagi Tohoku Gakuin University (Tagajo Campus) Detecting Backscatter of DDoS Attacks from Darknet Traffic
Nobuaki Furutani (Kobe Univ), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Jun Kitazono, Seiichi Ozawa (Kobe Univ) ICSS2014-59
In this work, we propose a method to quickly discriminate DDoS backscatter packets from those of other traffic observed ... [more] ICSS2014-59
pp.49-53
ISEC, LOIS, SITE 2014-11-21
14:40
Hyogo   Elliptic curves subjected to the GHS attack over prime degree extension fields in odd characteristic
Tsutomu Iijima (Koden), Jinhui Chao (Chuo Univ) ISEC2014-59 SITE2014-50 LOIS2014-29
One of the most powerful attacks to elliptic curve and hyperelliptic based cryptosystems defined over an extension of a ... [more] ISEC2014-59 SITE2014-50 LOIS2014-29
pp.19-26
IA 2014-11-06
15:30
Overseas Thailand Network Access Control by FPGA-Based Network Switch using HW/SW Cooperated IDS
Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2014-52
In recent years, cyber targeted attacks are becoming so sophisticated so that countermeasures for them is becoming impor... [more] IA2014-52
pp.91-96
ICSS 2013-03-25
14:55
Kanagawa Yokohama National University Network-based classification of remote exploit attacks focusing on UUID
Yusuke Takahashi (Yokohama National Univ.), Masaki Kamizono, Yuji Hoshizawa (Securebrain), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-65
Remote exploit attacks, which target vulnerabilities of network services, is the class of most common attacks utilized i... [more] ICSS2012-65
pp.49-54
ISEC 2010-12-15
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. The Mutual Information Analysis using a classification technique of combination
Kuniji Wakabayashi, Keisuke Iwai, Takakazu Kurokawa (NDA) ISEC2010-67
Against Side channel Attack Standard Evaluation BOard(SASEBO) implemented the AES encryption as hardware circuit, carr... [more] ISEC2010-67
pp.13-18
ICSS 2010-11-05
16:25
Hiroshima Hiroshima City University A Shellcode Analysis Method using CPU emulator and Dynamic Binary Instrumentation
Chiaki Jimbo, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2010-54
The epidemic of Conficker shows that remote exploit attack is still one of the most serious threats on the computer syst... [more] ICSS2010-54
pp.59-64
MoNA, IPSJ-MBL 2007-05-18
08:55
Okinawa Okinawa-seinen-kaikan A Classification of Defense Method in Ad-hoc Networks and Proposal for the Anti Attack Ad-hoc Routing Protocol Architecture
Takumi Mori, Ikumi Mori, Osamu Takahashi (FUN)
There are various kinds of attack for ad-hoc networks. Now, many defense methods are defense to detect the attack patter... [more] MoMuC2007-15
pp.73-78
 Results 21 - 30 of 30 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan